SlideShare une entreprise Scribd logo
1  sur  33
CELL PHONE CLONING

JASHIR C.K
S7 CSE
Rollno:28
INDEX
• INTRODUCTION
• HISTORY
• GSM
• CDMA
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• METHODS TO DETECT CLONED PHONES
• IMPACT OF CLONING
• HOW TO PREVENT CLONING?
• CONCLUSION
INTRODUCTION
CELL PHONE CLONING:
– copying the identity of one to another
– For making fraudulent calls

– security data transferred
– Other cell phone become exact replica of original
INTRODUCTION
– Calls can be made from both
– Original is billed
– One get huge bill, possibility of cloning
– No way the subscriber can detect
– Taking programmed information
– Service provider has no way to differentiate
WHEN DID CELL CLONING
START?
• In telecom market since 1990’s-mostly CDMA
• Started with Motorola “bag” phones.
• Motorola brick●

classic, model 800,ultra classic
GSM
– Global System for Mobile Communications.
– A digital cellular phone technology based on
TDMA
– Europe, other part of world
– Use SIM contain user account information
GSM
– Immediately programmed after plugging in the SIM
card
– Numerous handsets and service providers available in
the market
– They comes with cheaper call rate, free message
facility
– Airtel,vodafone
CDMA
–
Code Division Multiple Access.
–
Newer technology used in USA,Canada,Australia
–
Method for transmitting simultaneous signals over a shared portion of the
spectrum.
– SIM card
No
–
Call cost cheaper
–
Call quality better
–
Reliance,tata indicom
GSM vs. CDMA
• Both handsets are prone to cloning
• it is easier to clone a CDMA
handset over a GSM one
• Though cloning a GSM cell phone
is not impossible
IMPORTANT TERMS
• ESN, which stands for
Electronic Serial Number.
– It is same as the IMEI but is used in CDMA handsets
– loaded when the phone number is manufactured
– Can’t be change by user or subscriber
– If this is known, easily cloned
IMPORTANT TERMS
• MIN stands for Mobile Identification Number,
– which is the same as the SIM of GSM, can’t be replaced
– Min chip is embedded in CDMA handset
HOW IS A PHONE CLONED?
• ESN/MIN pair discovered via

●

Sniffing the cellular

●

Trashing cellular companies

●

Hacking cellular companies
HOW IS A PHONE CLONED?
• Each phone has MIN/ESN for identify the phone
• While placing a call, phone transmit both MSN/ESN
to n/w
HOW IS A PHONE CLONED?
• Cellular thieves capture MSN/ESN

●

cell phone ESN reader

●

digital data interpreters (DDI)
– Specially manufactured to intercept ESN/MIN pair
HOW IS A PHONE CLONED?
• MSN/ESN can be cloned
●

electronic scanning device

• Cloned one is ready
METHODS TO DETECT CLONED PHONES ON NETWORK

• Duplicate detection
• Velocity trap
• Radio Frequency
• Usage profiling
• Call counting
• PIN codes
METHODS TO DETECT CLONED
PHONES ON NETWORK
• Duplicate detection
– Same phone at several place at same time
– Shutting down all of them
– Real customer will contact
– Cloned user switch to another clone
Duplicate detection
METHODS TO DETECT CLONED
PHONES
• Velocity trap
– Mobile moving at impossible speeds
– Example(Idk (5min)Trv)
– Must be two phone with same identity on n/w
METHODS TO DETECT CLONED
PHONES
• RF (Radio Frequency)
– Even Nominally identical radio equipment has
distinguishing fingerprint,
– n/w s/w stores and compares fingerprints of all phones that
it sees
– This way, it will spot the clones with the same identity but
different fingerprints.
METHODS TO DETECT CLONED
PHONES
• Usage profiling
– Keep customer phone usage profile
– Discrepancies noticed ,customer is contacted
– Example(local call -) foreign )
– Indicates a possible clone
METHODS TO DETECT CLONED
PHONES
• Call counting
– Phone and n/w keep track of call made
– If they differ from usually allowed one ,service
denied
METHODS TO DETECT CLONED
PHONES
• PIN codes
– to placing a call, the caller unlocks the phone by
PIN
– After the call completed, the user locks
– Operators may share PIN information to enable
safer roaming
IMPACT OF CLONING
• Loss of revenue
• CTIA estimates that financial losses
– b/w $600million to $800 million in US
IMPACT OF CLONING
• Illegal activities
– This phenomenon is especially prevalent in drug crimes
HOW TO PREVENT CLONING?
• Uniquely identifies a mobile unit within a wireless
carrier's network.
• MINs and ESNs can be checked electronically to help
prevent fraud.
• Service providers have adopted certain measures to
prevent fraud, includes
– Encryption,blocking,blacklisting,user verification, traffic analysis
HOW TO PREVENT CLONING?
• User verification using PIN is one of the customer
verification method
• Check that all mobile devices are covered by a
corporate security policy
CONCLUSION
• Presently the cellular phone industry relies on
common law
– fraud and theft and in-house counter measures
to address cellular phone fraud.

• Mobile Cloning Is in initial stages in India
– Preventive step taken by govt & n/w provider
CONCLUSION
• Existing cellular systems have a number of potential
weaknesses
• It is crucial that businesses and staff take mobile
phone security seriously.
REFERENCE
• IEEE journal for mobile
communication
• www.google.com
• wikipedia.org
• www.1000project.org
• www.seminaronly.com
QUESTIONS???
THANK YOU

Contenu connexe

Tendances

Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authenticationJack Forbes
 
Security and management
Security and managementSecurity and management
Security and managementArtiSolanki5
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Malware forensic
Malware forensicMalware forensic
Malware forensicSumeraHangi
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email HackingUsman Khan
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 

Tendances (20)

Key management
Key managementKey management
Key management
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Cyber security
Cyber security Cyber security
Cyber security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Information technology act
Information technology actInformation technology act
Information technology act
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
 
Security and management
Security and managementSecurity and management
Security and management
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Phishing
PhishingPhishing
Phishing
 

En vedette

What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?Sameer Mathur
 
Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...sshihabm
 
Ch11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept QuestionsCh11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept QuestionsSherrylou Marzo
 
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey Catherine Lirio
 
10 questions chapter11
10 questions chapter1110 questions chapter11
10 questions chapter11noelenthns
 
Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?Channel IQ
 
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0Greg Hochmuth
 
Competitive strategies
Competitive strategiesCompetitive strategies
Competitive strategiesGeetika Madhur
 
competitive strategies of markets followers
competitive strategies of markets followerscompetitive strategies of markets followers
competitive strategies of markets followerskdore
 
Market follower strategy ppt
Market follower strategy pptMarket follower strategy ppt
Market follower strategy pptsreelakshmi nair
 
Competitive Strategy
Competitive StrategyCompetitive Strategy
Competitive StrategySakshi Mehra
 
SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?Lasersec Technologies
 

En vedette (14)

What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?
 
Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...
 
Ch11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept QuestionsCh11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept Questions
 
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
 
10 questions chapter11
10 questions chapter1110 questions chapter11
10 questions chapter11
 
Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?
 
Imitators
ImitatorsImitators
Imitators
 
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
 
Brand Imitation
Brand ImitationBrand Imitation
Brand Imitation
 
Competitive strategies
Competitive strategiesCompetitive strategies
Competitive strategies
 
competitive strategies of markets followers
competitive strategies of markets followerscompetitive strategies of markets followers
competitive strategies of markets followers
 
Market follower strategy ppt
Market follower strategy pptMarket follower strategy ppt
Market follower strategy ppt
 
Competitive Strategy
Competitive StrategyCompetitive Strategy
Competitive Strategy
 
SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?
 

Similaire à Cell Phone Cloning Detection & Prevention

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraudXINTEC
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 

Similaire à Cell Phone Cloning Detection & Prevention (20)

Fdp
FdpFdp
Fdp
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 

Dernier

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Dernier (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Cell Phone Cloning Detection & Prevention

  • 1. CELL PHONE CLONING JASHIR C.K S7 CSE Rollno:28
  • 2. INDEX • INTRODUCTION • HISTORY • GSM • CDMA • IMPORTANT TERMS • HOW IS A PHONE CLONED? • METHODS TO DETECT CLONED PHONES • IMPACT OF CLONING • HOW TO PREVENT CLONING? • CONCLUSION
  • 3. INTRODUCTION CELL PHONE CLONING: – copying the identity of one to another – For making fraudulent calls – security data transferred – Other cell phone become exact replica of original
  • 4. INTRODUCTION – Calls can be made from both – Original is billed – One get huge bill, possibility of cloning – No way the subscriber can detect – Taking programmed information – Service provider has no way to differentiate
  • 5. WHEN DID CELL CLONING START? • In telecom market since 1990’s-mostly CDMA • Started with Motorola “bag” phones. • Motorola brick● classic, model 800,ultra classic
  • 6. GSM – Global System for Mobile Communications. – A digital cellular phone technology based on TDMA – Europe, other part of world – Use SIM contain user account information
  • 7. GSM – Immediately programmed after plugging in the SIM card – Numerous handsets and service providers available in the market – They comes with cheaper call rate, free message facility – Airtel,vodafone
  • 8. CDMA – Code Division Multiple Access. – Newer technology used in USA,Canada,Australia – Method for transmitting simultaneous signals over a shared portion of the spectrum. – SIM card No – Call cost cheaper – Call quality better – Reliance,tata indicom
  • 9. GSM vs. CDMA • Both handsets are prone to cloning • it is easier to clone a CDMA handset over a GSM one • Though cloning a GSM cell phone is not impossible
  • 10. IMPORTANT TERMS • ESN, which stands for Electronic Serial Number. – It is same as the IMEI but is used in CDMA handsets – loaded when the phone number is manufactured – Can’t be change by user or subscriber – If this is known, easily cloned
  • 11. IMPORTANT TERMS • MIN stands for Mobile Identification Number, – which is the same as the SIM of GSM, can’t be replaced – Min chip is embedded in CDMA handset
  • 12. HOW IS A PHONE CLONED? • ESN/MIN pair discovered via ● Sniffing the cellular ● Trashing cellular companies ● Hacking cellular companies
  • 13. HOW IS A PHONE CLONED? • Each phone has MIN/ESN for identify the phone • While placing a call, phone transmit both MSN/ESN to n/w
  • 14.
  • 15. HOW IS A PHONE CLONED? • Cellular thieves capture MSN/ESN ● cell phone ESN reader ● digital data interpreters (DDI) – Specially manufactured to intercept ESN/MIN pair
  • 16. HOW IS A PHONE CLONED? • MSN/ESN can be cloned ● electronic scanning device • Cloned one is ready
  • 17. METHODS TO DETECT CLONED PHONES ON NETWORK • Duplicate detection • Velocity trap • Radio Frequency • Usage profiling • Call counting • PIN codes
  • 18. METHODS TO DETECT CLONED PHONES ON NETWORK • Duplicate detection – Same phone at several place at same time – Shutting down all of them – Real customer will contact – Cloned user switch to another clone
  • 20. METHODS TO DETECT CLONED PHONES • Velocity trap – Mobile moving at impossible speeds – Example(Idk (5min)Trv) – Must be two phone with same identity on n/w
  • 21. METHODS TO DETECT CLONED PHONES • RF (Radio Frequency) – Even Nominally identical radio equipment has distinguishing fingerprint, – n/w s/w stores and compares fingerprints of all phones that it sees – This way, it will spot the clones with the same identity but different fingerprints.
  • 22. METHODS TO DETECT CLONED PHONES • Usage profiling – Keep customer phone usage profile – Discrepancies noticed ,customer is contacted – Example(local call -) foreign ) – Indicates a possible clone
  • 23. METHODS TO DETECT CLONED PHONES • Call counting – Phone and n/w keep track of call made – If they differ from usually allowed one ,service denied
  • 24. METHODS TO DETECT CLONED PHONES • PIN codes – to placing a call, the caller unlocks the phone by PIN – After the call completed, the user locks – Operators may share PIN information to enable safer roaming
  • 25. IMPACT OF CLONING • Loss of revenue • CTIA estimates that financial losses – b/w $600million to $800 million in US
  • 26. IMPACT OF CLONING • Illegal activities – This phenomenon is especially prevalent in drug crimes
  • 27. HOW TO PREVENT CLONING? • Uniquely identifies a mobile unit within a wireless carrier's network. • MINs and ESNs can be checked electronically to help prevent fraud. • Service providers have adopted certain measures to prevent fraud, includes – Encryption,blocking,blacklisting,user verification, traffic analysis
  • 28. HOW TO PREVENT CLONING? • User verification using PIN is one of the customer verification method • Check that all mobile devices are covered by a corporate security policy
  • 29. CONCLUSION • Presently the cellular phone industry relies on common law – fraud and theft and in-house counter measures to address cellular phone fraud. • Mobile Cloning Is in initial stages in India – Preventive step taken by govt & n/w provider
  • 30. CONCLUSION • Existing cellular systems have a number of potential weaknesses • It is crucial that businesses and staff take mobile phone security seriously.
  • 31. REFERENCE • IEEE journal for mobile communication • www.google.com • wikipedia.org • www.1000project.org • www.seminaronly.com